CVE-2001-0432
CVSS10.0
发布时间 :2001-07-02 00:00:00
修订时间 :2008-09-05 16:24:05
NMCOES    

[原文]Buffer overflows in various CGI programs in the remote administration service for Trend Micro Interscan VirusWall 3.01 allow remote attackers to execute arbitrary commands.


[CNNVD]Trend Micro Interscan Viruswall的CGI程序缓冲区溢出漏洞(CNNVD-200107-008)

        
        Interscan Viruswall 是Trend Micro出品的一个病毒扫描软件包。它由Trend Micro公司发行和维护,设计用来对网关上的SMTP、FTP、HTTP进出通讯进行扫描,以发现病毒的传播。
        这个软件包的管理界面中一些CGI存在的缓冲区溢出问题,可导致远程获取主机的root用户权限。
        与它一起使用的管理界面使用几个cgi目录中的程序,这几个程序有缓冲区溢出漏洞。另外,用来执行这几个程序的HTTP守护进程以root用户身份运行,并且不能有效控制对这些程序的访问,使得用户可以直接执行它们。因此远程用户有可能利用与Interscan Viruswall一起打包的这些CGI程序中的缓冲区溢出漏洞,利用它来以root用户身份执行任意命令。
        

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0432
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0432
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200107-008
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/2579
(VENDOR_ADVISORY)  BID  2579
http://archives.neohapsis.com/archives/bugtraq/2001-04/0218.html
(VENDOR_ADVISORY)  BUGTRAQ  20010413 Trend Micro Interscan VirusWall 3.01 vulnerability

- 漏洞信息

Trend Micro Interscan Viruswall的CGI程序缓冲区溢出漏洞
危急 边界条件错误
2001-07-02 00:00:00 2005-10-20 00:00:00
远程  
        
        Interscan Viruswall 是Trend Micro出品的一个病毒扫描软件包。它由Trend Micro公司发行和维护,设计用来对网关上的SMTP、FTP、HTTP进出通讯进行扫描,以发现病毒的传播。
        这个软件包的管理界面中一些CGI存在的缓冲区溢出问题,可导致远程获取主机的root用户权限。
        与它一起使用的管理界面使用几个cgi目录中的程序,这几个程序有缓冲区溢出漏洞。另外,用来执行这几个程序的HTTP守护进程以root用户身份运行,并且不能有效控制对这些程序的访问,使得用户可以直接执行它们。因此远程用户有可能利用与Interscan Viruswall一起打包的这些CGI程序中的缓冲区溢出漏洞,利用它来以root用户身份执行任意命令。
        

- 公告与补丁

        厂商补丁:
        Trend Micro
        -----------
        目前厂商已经发布了3.6版以修复这个安全问题,请到厂商的主页下载:
        
        http://www.antivirus.com/

- 漏洞信息 (20750)

Trend Micro Interscan Viruswall (Linux) 3.0.1 Multiple Program Buffer Overflow (EDBID:20750)
linux dos
2001-04-13 Verified
0 eeye security
N/A [点击下载]
source: http://www.securityfocus.com/bid/2579/info

Interscan Viruswall is a Virus scanning software package distributed and maintained by Trend Micro. It is designed to scan for virus occurances in both incoming and outgoing traffic via SMTP, FTP, and HTTP at the gateway of the network.

A problem with the software package could lead elevated privileges on the scanning system. The management interface used with the Interscan Viruswall uses several programs in a cgi directory that contain buffer overflows. Additionally, the http daemon used to execute these programs runs as root, and does not sufficiently control access to the programs, allowing a user to execute them directly.

Therefore, it is possible for a remote user to exploit buffer overflows in the cgi programs packaged with Interscan Viruswall, and execute arbitrary commands are root on the system hosting Viruswall. 

http://server:1812/catinfo?4500xA 		

- 漏洞信息

539
Trend Micro InterScan VirusWall catinfo Overflow
Local Access Required Input Manipulation
Loss of Integrity Patch / RCS
Exploit Public Vendor Verified

- 漏洞描述

This host is running the 'Trend Micro Interscan Virus Wall 3.0.1'. This application is vulnerable to a remote buffer overflow. This overflow occurs in the 'catinfo' CGI program. By issuing a malformed request, an attacker can gain access to this host.

- 时间线

2001-04-13 Unknow
Unknow Unknow

- 解决方案

The vendor has released a patch that fixes this issue. Please upgrade to that latest version of Trend Micro Interscan Virus Wall available from http://www.antivirus.com/.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Trend Micro Interscan Viruswall Multiple Program Buffer Overflow Vulnerability
Boundary Condition Error 2579
Yes No
2001-04-13 12:00:00 2009-07-11 06:06:00
This vulnerability was announced to Bugtraq in an Eeye Security Advisory on April 13, 2001.

- 受影响的程序版本

Trend Micro Interscan Viruswall (Linux) 3.0.1
- RedHat Linux 6.2 i386
- RedHat Linux 6.1 i386
- S.u.S.E. Linux 7.0
- S.u.S.E. Linux 6.4
- Turbolinux Turbolinux 6.1
Trend Micro Interscan Viruswall (Linux) 3.6
- RedHat Linux 6.2 i386
- RedHat Linux 6.1 i386
- S.u.S.E. Linux 7.0
- S.u.S.E. Linux 6.4
- Turbolinux Turbolinux 6.1

- 不受影响的程序版本

Trend Micro Interscan Viruswall (Linux) 3.6
- RedHat Linux 6.2 i386
- RedHat Linux 6.1 i386
- S.u.S.E. Linux 7.0
- S.u.S.E. Linux 6.4
- Turbolinux Turbolinux 6.1

- 漏洞讨论

Interscan Viruswall is a Virus scanning software package distributed and maintained by Trend Micro. It is designed to scan for virus occurances in both incoming and outgoing traffic via SMTP, FTP, and HTTP at the gateway of the network.

A problem with the software package could lead elevated privileges on the scanning system. The management interface used with the Interscan Viruswall uses several programs in a cgi directory that contain buffer overflows. Additionally, the http daemon used to execute these programs runs as root, and does not sufficiently control access to the programs, allowing a user to execute them directly.

Therefore, it is possible for a remote user to exploit buffer overflows in the cgi programs packaged with Interscan Viruswall, and execute arbitrary commands are root on the system hosting Viruswall.

- 漏洞利用

http://server:1812/catinfo?4500xA

- 解决方案

Upgrade available:


Trend Micro Interscan Viruswall (Linux) 3.0.1

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站